ELK is Elasticsearch, Logstash, and Kibana and together they provide a framework for collecting, storing, and investigating network security data. In this course, you’ll learn how to use this powerful trio to perform security analysis. This isn’t just an ELK course; it’s a course on how to use...
Learn how to analyze malware using tools for Dynamic and Static analysis. Understand how to use IDA Pro Disassembler and Immunity Debugger, how to intercept process injection, how to add network detection with Snort or at binary-level with Yara.
As a Reverse Engineer you need to know how to...
Be able to use a Pc or Mac at a beginner level
Welcome to my course "Complete Cyber Security Masterclass: Beginner to Advance". By using this comprehensive course you will learn the basics of Cyber Security, Some of the advanced methods of Cyber attacks and much more.In this course i will...
The Cisco Certified Network Associate (CCNA) certification has been updated to reflect the latest technologies and job roles. The revised exam tests IT professionals’ understanding of foundational networking topics in six domains, including the two covered in this course: security, and...
Security is a critical concern for anyone who uses the cloud. Microsoft takes this seriously and built and operates the Azure Platform with security as a key principle. Microsoft secures data centers, and management applications; and provides pay-as-you-go security services
Learn how to take...
This course sums up more than 10 years working on IT and the content of a master degree in information technologies security.
The topics are:
CIA triad, types of attacks and security mechanisms
Security concepts and methodologies (Terminology, Security properties and case study of a Risk...
The Absolute Beginners Guide to Cyber Security and Hacking (12/2019)
2020 Launch! Become a Cyber Security Specialist, Build technical capability in ethical hacking &web application security
What you’ll learn
-You will learn the background of Cybersecurity & Hacking. You will learn what is...
What you’ll learn
You will go through a demo on SYN flooding attach using hping3 command
You will go through a demo on Metasploit test. Metasploit is a penetration testing framework that makes hacking simple. It’s an essential tool for many attackers and defenders.
You will start using Maltego...
Zero Point Security – Red Team Ops 2025
English | Tutorial | Size: 1.2 GB
Red Team Ops is an online, self-study course that teaches the basic principles, tools and techniques synonymous with red teaming.
Students will first cover the core concepts of adversary simulation, command & control...
Udemy – Certified Kubernetes Security Specialist – Zeal Vora (Mar 2025)
English | Tutorial | Size: 10 GB
Master Course to prepare for CKS certification.
This course is specifically designed for the aspirants who intend to give the “Certified Kubernetes Security Specialist” certification...
Master Windows Security: Protect System Integrity & Control Application Execution
What you’ll learn:
Understand Windows boot security (Secure Boot, Trusted Boot, and ELAM)
Learn how to implement Application Allowlisting with Applocker & WDAC
Discover how malware abuses unprotected Windows...
In this course you will learn;
Passing the CompTIA Security+ certification exam with confidence
Understand computer security, its functions, and its components
Performing basic security configurations
Become an effective security technician in a business environment
Network topologies
Threat...
Certified Information System Security Professional (CISSP) is the most globally recognized certification in the information security market. In fact, many consider CISSP the gold standard for industry cyber and information security professionals to obtain because it certifies they have the...
SAR & Threat Modeling for Absolute Beginners | Learn STRIDE, DREAD Threat Models | Learn IriusRisk, MTM tools
Course Updates:
v 2.0 – Jan 2024
Updated course with Assignment Solution with Design Review Checklist Solution
Updated course with video lectures on Relation between Security...
Developing security in the Software Development Life Cycle (SDLC)
What you’ll learn
Learn how to become an application security champion.
What is the OWASP Top 10 and how to defend against those vulnerabilities.
Use of threat modeling to identify threats and mitigation in development...
The industry-leading Penetration Testing with Kali Linux (PWK/PEN-200) course introduces penetration testing methodology, tools, and techniques in a hands-on, self-paced environment. Access PEN-200’s first Learning Module for an overview of course structure, learning approach, and what the...
Master Intelligence Gathering and Dark Web Navigation with Hands-On Projects and Real-World Tools
What you’ll learn
You will be able to conduct searches on a company, person or entity within a legal framework.
The first part OSINT provides this, where students will be able to get publicly...
Securing Critical Infrastructure: A Guide to Cybersecurity in Industrial Control Systems and IEC 62443 Compliance
What you’ll learn:
Understand ICS architecture and its vulnerabilities in critical infrastructure.
Apply defense-in-depth strategies to safeguard industrial control systems...
Windows User Mode Exploit Development (EXP-301) is a course that teaches learners the basics of modern exploit development. Despite being a fundamental course, it is at the 300 level because it relies on substantial knowledge of assembly and low level programming. It begins with basic buffer...
CPanel Hunter 2026
CPanel Hunter 2026
Unveiling CPanel Hunter 2026: Next-Gen Open-Source cPanel Credential Validation & Security Testing Tool
In the dynamic world of web hosting security and ethical cybersecurity research in 2026, tools like CPanel Hunter 2026 stand out as essential...
Take your Azure Red Team skills to the next level. Get trained in Azure pentesting, Red Teaming and Defense against an enterprise-like live Azure environment with focus on OPSEC and bypassing defenses. Earn the Certified by Altered Security Red Team Expert for Azure (CARTE) certification...
Secure any Linux server from hackers & protect it against hacking. The practical Linux Administration security guide.
What you’ll learn:
By the end of this course you will be able to harden a Linux system, reduce its surface of vulnerability, and reduce the risk of your Linux system being...
Your Hands-On Cyber Security Journey Starts Here: Go from beginners to Intermediate in Cybersecurity and Ethical hacking
Learn Cybersecurity and Ethical hacking from from Scratch
This comprehensive course is designed for beginners with no prior knowledge of cybersecurity. It provides a...
Certified Information Security Manager: CISM Complete Course | Udemy
English | Size: 18.16 GB
Genre: eLearning
Complete Information Security Manager CISM Exam Prep – Security Training you need to ace ISACA CISM Exam with Quizzes
What you’ll learn:
Prepare for the 2022 edition of the CISM...
Volume 1 : Become a Cyber Security Specialist, Learn How to Stop Hackers, Prevent Hacking, Learn IT Security & INFOSEC
What you’ll learn:
An advanced practical skillset in defeating all online threats – advanced hackers, trackers, malware and all Internet nastiness & govenment mass...
This course is the last step in your preparation for achieving the prestigious CCIE certification. This lab-oriented course comprises 30+ labs and 50+ tasks focusing on technologies like ASA, VPNs, FTD/FMC, WSA, ISE, and StealthWatch. Solution videos accompany each LAB to help you understand...
What you’ll learn:
An advanced practical skill-set in assuring network security against all threats including – advanced hackers, trackers, exploit kits, Wi-Fi attacks and much more.
In this volume, we take a detailed look at network security.
Start a career in cyber security. Become a cyber...
Become professional in Web Application Penetration Testing and prepare for the Burp Suite Certified Practitioner (BSCP)
What you’ll learn:
advanced web application vulnerabilities
get to a professional level in web application penetration testing
get to a professional level in web application...
Master the basics of Web Application Penetration Testing
What you’ll learn:
basic web application vulnerabilities
getting started in web application penetration testing
getting started in web application bug bounty
preparing for the Burp Suite Certified Practitioner (BSCP) certification
52...
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Jump-start your cybersecurity career from the gateway to success: A SOC Analyst (2025)
What you’ll learn:
Learn what it takes to begin your career in cybersecurity from the easiest point of entry.
Learn about how the pandemic impacted the demand for cybersecurity.
Learn why the Security...
Your path to a career in information security.. Build job-ready skills in ethical hacking, network defense, digital forensics & security operations
What you’ll learn:
Learn to identify, exploit, and mitigate vulnerabilities using ethical hacking techniques.
Implement robust network security...
Become an expert for wide-ranging privacy and security topics!
What you’ll learn:
Understand how to design apps with privacy and security in mind
Be able to discuss a wide variety of privacy and security-related topics
Know about fundamental Android security concepts
Understand symmetric and...
Learn how to hack web applications, automate your exploits in python and defend web applications against real world attacks! For each vulnerability type, we dive into the technical details and then gain hands-on experience by solving labs that model real-world vulnerabilities.
Syllabus...
Security Operations (SOC) 201 is an intermediate security operations course designed to enhance your skills in detecting, investigating, and responding to complex cyber threats at scale. After establishing fundamental security operations knowledge and practical skills in SOC 101, the next...
Most enterprise networks today are managed using Active Directory and it is imperative for a security professional to understand the threats to the Windows infrastructure. Certified Red Team Expert (CRTE) course and lab is designed to provide a platform for security professionals to understand...
What is Certified Red Team Professional?
Altered Security’s Certified Red Team Professional (CRTP) is a beginner friendly hands-on red team certification. It is one of the most popular beginner Red Team certification.
What is the goal of the CRTP exam?
The 24 hour hands-on exam consists of...
More than 95 percent of Fortune 500 use Azure today! A huge number of organizations use Azure AD (Entra ID) as an Identity and Access Management platform. This makes it imperative to understand the risks associated with Azure as it contains an enterprises infrastructure, apps, identities and a...
Practical API Hacking provides you with everything you need to start hacking APIs. This course was designed for beginners and those familiar with web application hacking but want to expand their skill set.
The course covers industry-standard tools such as Burp Suite and Postman, and how to...
What you’ll learn:
Conduct basic and advanced attacks on Unix systems.
Leverage programming and scripting for privilege escalation and lateral movement in computer networks.
Discover, debug and exploit binary vulnerabilities on modern operating systems.
Advanced Offensive Techniques on hardened...
Analyze traces on Windows, Linux, and macOS, file systems like NTFS, Ext, APFS, and understand encryption and malware.
What you’ll learn:
Digital Forensics Basics: Tasks, requirements, and methods for securing and analyzing digital evidence. Essential hardware and software knowledge.
DIN EN...
Master Wi-Fi security and ethical penetration testing with hands-on labs and industry-standard tools.
What you’ll learn:
Wireless Network Security: Identify and assess vulnerabilities in Wi-Fi networks, including WEP, WPA, and WPA2 protocols.
Penetration Testing Techniques: Gain hands-on...
“I always recommend Python as a language for security professionals. It’s a great easy first language to learn and allows you to create highly functional programs with not much code. Its good for penetration testing, security operations, cyber security roles and general automation of tasks...
This learning path consolidates all INE’s CCNP Security Core exam content into a single trackable path you can follow to your success! This series explains how to implement and operate core security technologies including network security, cloud security, content security, endpoint protection...
Master the Basics of Artificial Intelligence in Cybersecurity – No Prior AI Knowledge Needed
What you’ll learn:
Students will learn how Artificial Intelligence (AI), Machine Learning (ML), and Deep Learning (DL) are transforming modern cybersecurity operations.
Students will gain practical...
Getting Personal with WPA3 Wi-Fi Security is a hands-on, practitioner-oriented deep dive into modern 802.11 security. The course builds from Wi-Fi key management fundamentals and the RSN framework—covering PMK/PTK derivation and the 4-way EAPOL handshake—to the evolution from WPA2 to WPA3...
A hands-on introduction to Container Security, this bootcamp shows you how misconfigured components can lead to breakout attacks and eventually, host compromise.
Recordings of this bootcamp are now available as part of our annual subscription. Subscribe to enjoy:
Access to all on-demand...